Customized Intrusion Detection Based on a Database Audit Log.
Thomas LeWilliam MitchellBehnam S. AradPublished in: CATA (2019)
Keyphrases
- intrusion detection
- database
- intrusion detection system
- anomaly detection
- network intrusion detection
- network security
- network traffic
- information security
- high detection rate
- artificial immune
- databases
- cyber security
- database systems
- false positives and false negatives
- detecting anomalous
- data mining
- computer security
- data mining techniques
- data model
- network attacks
- network intrusion
- data sets
- alert correlation
- lightweight
- face recognition
- metadata
- normal behavior
- data management
- network traffic data
- information systems
- network intrusions
- intrusion prevention